• 제목/요약/키워드: risks

검색결과 4,958건 처리시간 0.032초

Transfusion practice in neonates

  • Kim, Do-Hyun
    • Clinical and Experimental Pediatrics
    • /
    • 제61권9호
    • /
    • pp.265-270
    • /
    • 2018
  • Neonates, especially extremely low birth weight infants, are among the groups of patients undergoing transfusion frequently. Since they are exposed to higher specific transfusion risks compared to the patients of other age groups, there are many special aspects that must be considered for transfusion therapy in neonates. The transfusion risks in neonates include adverse outcomes specific for preterm infants as well as increased metabolic, immunologic, and infectious complications. To reduce the risks of transfusion-transmitted cytomegalovirus infection and transfusion-associated graft-versus-host disease, leukoreduced and irradiated cellular blood products should be used for all neonates. This review summarizes the risks of neonatal transfusion therapy, specific methods to reduce risk, and current trends and practices of red blood cell and platelet transfusions in neonates, to facilitate decision-making for neonatal transfusion.

An Analysis of Information Security Management Strategies in the Presence of Interdependent Security Risk

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • 제22권1호
    • /
    • pp.79-101
    • /
    • 2012
  • This study expands the current body of research by exploring multiple scenarios of insufficient and excessive IT security investments caused by interdependent risks and the interplay between IT security investments and cyber insurance. A key finding is that organizations experiencing interdependent risks with different types of cyber attacks (i.e., targeted and untargeted attacks) use different strategies in making IT security investment decisions and in purchasing cyber insurance policies for their information security risk management than firms that are facing independent risks. The study further provides an economic rationale for employing insurance mechanisms as a risk management solution for information security.

  • PDF

Vulnerability and Information Security Investment Under Interdependent Risks: A Theoretical Approach

  • Shim, Woo-Hyun
    • Asia pacific journal of information systems
    • /
    • 제21권4호
    • /
    • pp.27-43
    • /
    • 2011
  • This article explores economic models that show the optimal level of information security investment in the presence of interdependent security risks, Using particular functional forms, the analysis shows that the relationship between the levels of security vulnerability and the levels of optimal security investments is affected by externalities caused by agents' correlated security risks. This article further illustrates that, compared to security investments in the situation of independent security risks, in order to maximize the expected benefits from security investments, an agent should invest a larger fraction of the expected loss from a security breach in the case of negative externalities, while an agent should spend a smaller fraction of the expected loss in the case of negative externalities.

Enhancement of VECTOR Method by Adapting OCTAVE for Risk Analysis in Legacy System Migration

  • Hakemi, Aida;Jeong, Seung Ryul;Ghani, Imran;Sanaei, Mojtaba Ghanaatpisheh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권6호
    • /
    • pp.2118-2138
    • /
    • 2014
  • Risks are involved in all phases of the software life cycle, and due to these risks, software can face various problems that can cause different negative outcomes and sometimes, in extreme cases, the failure of the software. Most of these risks lie in the legacy software migration process. These risks can create many problems, and in the worst case they can lead to the failure of the migration project. This paper explores different types of risk analysis methods such as CRAMM, CORAS, OCTAVE and VECTOR. After comparing these methods, the two suitable methods were chosen, namely, OCTAVE and VECTOR. Based on the use of these two methods, the project suggests an enhanced EOV method for risk analysis in the migration of legacy software.

의사결정 집중화 수준과 불확실성이 실물옵션 활용에 미치는 영향에 대한 연구 : 국내 중소기업 클라우드 서비스 도입에 대한 연구 (Effect of Centralization in Decision Making Upon Real Option Utilization : Empirical Approach of Cloud Service Implementation in Korean Small & Medium Sized Firms)

  • 김태하;남승현;양희동
    • Journal of Information Technology Applications and Management
    • /
    • 제24권4호
    • /
    • pp.117-131
    • /
    • 2017
  • We question whether Korean IT managers consider real options to reduce risks of cloud service implementation. This work investigates the impact of technology risk, relationship risk, economy risk, security risk upon the intention of IT managers to utilize abandon & expansion options. We also analyze moderation effect of centralization level of decision making between these risks and the utilization of real options. Using the survey questionnaire, we empirically find that technology risk, relationship risk and security risk have significant effect upon abandon option and technology risk, relationship risk, and economy upon expansion option. We also find the evidence that centralization level moderates some risks and the direction of moderation effect is to offset the effect of risks on intention to utilize real options.

Contemplation of Risk Management for Internet Banking System

  • Seo, Jang-Hoon;Park, Myeong-Kyu
    • 대한안전경영과학회지
    • /
    • 제5권2호
    • /
    • pp.41-51
    • /
    • 2003
  • Next Generation internet banking service for important role of banking business competitive power separates service function of individual banking and should equip various service that coincides in each special qualities these are customer management, portfolio management, global corporation support etc. The past few years have been characterized by rapid changes in technology and the introduction of corporate and retail banking services through the Internet. the integration of e-banking platforms with legacy systems and the increasing dependence of banks on third party information service providers, all dramatically amplify the magnitude of risks to which banks are exposed. Risk management disciplines have not evolved at the same speed and many institutions, especially the smaller ones, have not been able to incorporate Internet banking risk controls within their existing risk management structures. This article provides an overview of the various risks which are heightened with Internet banking, and a holistic approach to managing these risks. In addition, the presentation will explain the different risk areas and the controls to be adopted to mitigate these risks.

구간치 쇼케이적분과 위험률 가격 측정에서의 응용 (Interval-valued Choquet integrals and applications in pricing risks)

  • 장이채
    • 한국지능시스템학회논문지
    • /
    • 제17권4호
    • /
    • pp.451-454
    • /
    • 2007
  • Non-additive measures and their corresponding Choquet integrals are very useful tools which are used in both insurance and financial markets. In both markets, it is important to update prices to account for additional information. The update price is represented by the Choquet integral with respect to the conditioned non-additive measure. In this paper, we consider a price functional H on interval-valued risks defined by interval-valued Choquet integral with respect to a non-additive measure. In particular, we prove that if an interval-valued pricing functional H satisfies the properties of monotonicity, comonotonic additivity, and continuity, then there exists an two non-additive measures ${\mu}1,\;{\mu}2$ such that it is represented by interval-valued choquet integral on interval-valued risks.

How to Manage Cloud Risks Based on the BMIS Model

  • Song, Youjin;Pang, Yasheng
    • Journal of Information Processing Systems
    • /
    • 제10권1호
    • /
    • pp.132-144
    • /
    • 2014
  • Information always comes with security and risk problems. There is the saying that, "The tall tree catches much wind," and the risks from cloud services will absolutely be more varied and more severe. Nowadays, handling these risks is no longer just a technology problem. So far, a good deal of literature that focuses on risk or security management and frameworks in information systems has already been submitted. This paper analyzes the causal risk factors in cloud environments through critical success factors, from a business perspective. We then integrated these critical success factors into a business model for information security by mapping out 10 principles related to cloud risks. Thus, we were able to figure out which aspects should be given more consideration in the actual transactions of cloud services, and were able to make a business-level and general-risk control model for cloud computing.

천연염색 의류제품에 대한 지각된 위험과 혜택 -천연염색 제품지식에 따른 차이- (Perceived Risks and Benefits to Natural Dyeing Product -The Role of Product Knowledge-)

  • 홍희숙;홍병숙
    • 한국의류학회지
    • /
    • 제32권9호
    • /
    • pp.1343-1355
    • /
    • 2008
  • This study examined the influences of product knowledge(subject knowledge, purchase experience and information search) on perceived risks and benefits to natural dyeing product. Data were collected from a total of 213 Korean females ranging from 20 to 50 years old who know natural dyeing product through online survey. There were significant differences between(or among) groups with different levels of subject knowledge, purchase experience and information search in several types of perceived risks and benefits to natural dyeing product. Consumers with high knowledge of natural dyeing product perceived several types of risks lower than consumers with low knowledge but they perceived several types of benefits higher than consumers with low knowledge.

A Framework of Managing Supply Chain Disruption Risks Using Network Reliability

  • Ohmori, Shunichi;Yoshimoto, Kazuho
    • Industrial Engineering and Management Systems
    • /
    • 제12권2호
    • /
    • pp.103-111
    • /
    • 2013
  • This paper discusses how to manage supply chain disruption risks from natural disasters or other low-likelihood-high-impact risk drivers. After the catastrophic earthquake in Eastern Japan and the severe flood in Thailand, most companies have been attempting to re-establish the business continuity plan to prevent their supply chain from disruption. However, the challenges for managers and individual risks are often interrelated, and thus, actions that mitigate one risk can end up being no contribution as a whole. In this paper, we describe a framework for assessing how much impact individual mitigation strategies have on the entire supply chain protection against disruption, using network reliability. We propose three categories of risk-mitigation approaches: Stabilization, Absorption, and Duplication. We analyze the situation under which each of these strategies is the best suitable. With a clear understanding of relations between these mitigation strategies and the entire supply chain risks, managers can select effective risk-reduction approaches to their supply chain.